According to our database1, Leyi Shi authored at least 17 papers between 2007 and 2019.
Legend:Book In proceedings Article PhD thesis Other
RMTS: A robust clock synchronization scheme for wireless sensor networks.
J. Network and Computer Applications, 2019
Mimicry honeypot: an evolutionary decoy system.
A Game-Theoretic Analysis for Distributed Honeypots.
Future Internet, 2019
Dynamic Distributed Honeypot Based on Blockchain.
IEEE Access, 2019
Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks.
IEEE Access, 2019
Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems.
IEEE Internet of Things Journal, 2018
Performance Analysis of Honeypot with Petri Nets.
Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags.
IEEE Access, 2018
Efficient 3-dimensional localization for RFID systems using jumping probe.
Pervasive and Mobile Computing, 2017
Patching by automatically tending to hub nodes based on social trust.
Computer Standards & Interfaces, 2016
A decentralized and personalized spam filter based on social computing.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014
An ACO-Based Trust Inference Algorithm.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Automatic Patching Based on Social Computing in P2P Network.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
A Dynamic Trust Conference Algorithm for Social Network.
Proceedings of the Eighth International Conference on P2P, 2013
An Improved Anti-collision Algorithm for ISO15693 RFID Systems.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Full Service Hopping for Proactive Cyber-Defense.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Port and Address Hopping for Active Cyber-Defense.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007